🕵️♂️Get Upto 80% Off On All Products, StaySharp⚡
DoorDash Data Breach October 2025: Breach Analysis
DoorDash disclosed its third major breach in 6 years (Oct 2025). Millions of users’ names, emails, phone numbers, and delivery addresses were exposed, but no passwords or full payment cards. Phishing and spam risks are now high.
CYBERSECURITYDEVELOPMENT AND ECONOMIC THREATS CYBER WARFARE
Phillemon Neluvhalani
11/13/20253 min read


DoorDash Americas largest food delivery platform is notifying millions of users about a new data breach the company’s third major incident in six years. The breach was detected in late October 2025 and is only now reaching the public through individual email notifications and scattered media reports. As of today DoorDash has not published an official blog post or SEC filing making customer emails and a handful of cybersecurity sources the primary windows into what happened.
Timeline of Events
On or around October 25 2025 Unauthorized third party gains access to certain DoorDash internal systems.
Late October early November 2025 DoorDash engages a leading external forensics firm believed to be Mandiant or CrowdStrike though not officially named.
November 11 to 13 2025 DoorDash begins sending databreach notification emails to affected customers Dashers and merchants.
November 13 2025 First mainstream media reports appear MobileSyrup BleepingComputer TechCrunch.
November 14 2025 DoorDash establishes a dedicated support hotline 18339188030 with reference code B155060.
What Was Actually Stolen
According to the official notification language DoorDash is sending
Compromised data includes
1.Full name
2.Email address
3.Phone number
4.Delivery addresses
5.Order history metadata restaurant names and dates but not itemlevel details
Explicitly NOT compromised
1.Full payment card numbers
2.CVV codes
3.Bank account numbers
4.Social Security numbers or government IDs
5.DoorDash account passwords
6.Drivers license numbers for Dashers
This makes the 2025 incident significantly less severe on paper than the two previous breaches where partial or hashed payment data and in 2019 drivers license numbers were exposed.
How Did the Attackers Get In?...
DoorDash has not disclosed the initial access vector. Sources familiar with the investigation tell BleepingComputer that the compromise appears to have originated through a thirdparty software provider that DoorDash uses for customer communication and address validation similar to the 2022 incident that rode on the Twilio breach. However DoorDash has not confirmed this and the company is still using phrases like “an unauthorized third party” in its notifications.
What is the Scale of the Breach?...
DoorDash has not released an official count of affected individuals. The notification email states only that “a portion” of users are impacted. Unofficial estimates from cybersecurity researchers monitoring darkweb chatter place the exposed dataset in the low single digit millions likely 2 to 4 million records far smaller than the 4.9 million affected in 2019.
Comparison With Past DoorDash Breaches
Here is the comparison rewritten in bullet points
2019 Incident
• Discovered in September 2019
• Root cause was a database misconfiguration
• About 4.9 million users affected
• Data included names emails addresses phone numbers hashed passwords last 4 card digits and some drivers licenses
• Full card numbers were not taken
2022 Incident
• Discovered in August 2022
• Root cause was phishing of a thirdparty vendor Twilio
• Hundreds of thousands of users affected
• Data included names emails phone numbers last 4 card digits expiry information and delivery addresses
• Full card numbers were not taken
2025 Incident new
• Discovered in October 2025
• Root cause remains unknown but likely a thirdparty supply chain weakness
• Estimated 2 to 4 million users affected
• Data included names emails phone numbers and delivery addresses only
• Full card numbers were not taken
RealWorld Risks This Time
Even though no financial data was taken the combination of full name phone and exact delivery address is extremely valuable to scammers
• Hypertargeted smishing SMS phishing pretending to be DoorDash support
• Porch pirate coordination using known delivery windows and addresses
• Doxxing or swatting risks for highprofile users
• Spam call and text surges many users are already reporting increased robocalls within 48 hours
DoorDash’s Official Response
The company’s notification email is unusually detailed compared to past incidents. It includes
• A direct support hotline 18339188030 reference code B155060
• Assurance that no action is required from users who were not notified
• A promise to provide one year of free identity monitoring through a service not yet named
It has been alleged, As of November 14 there is still no dedicated page on doordash.com security or a public blog post which security researchers criticize as an attempt to keep the incident quiet during the preholiday season.
What Should You Do
If you received the official DoorDash breach email
• Do not click any links in the email. Type doordash.com manually and log in.
• Change your password and enable 2FA.
• Watch for SMSs scams claiming your account is locked or offering refunds.
• Read your number to the National Do Not Call Registry and enable carrier spam blocking.
If you did NOT receive an email you are almost certainly not in this breached dataset.
Let's be Real...
Three breaches in six years suggests a pattern not random bad luck. DoorDash’s rapid expansion involving many thirdparty tools continues to widen its attack surface. Competitors like Uber Eats and Grubhub have had far fewer incidents during the same period.
Privacy advocates especially in California are calling for regulatory action under CCPA which can fine companies up to 7500 per affected consumer for negligent data handling.
Yes, The 2025 DoorDash breach is real but the least damaging of the three in terms of raw sensitivity. The real threat is phishing harassment and targeted scams using newly leaked phone numbers and home addresses the kind of information food delivery users cannot easily change.
Stay alert treat any unexpected DoorDash message as suspicious and hope we do not have to write about another breach anytime soon.



